Method of operating a security device, security device and data

Registers – Systems controlled by data bearing records – Credit or identification card systems

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

235382, 235461, 235489, 34082531, 70278, G06K 701

Patent

active

047912804

DESCRIPTION:

BRIEF SUMMARY
A first aspect of the present invention to a method of operating a security device having a memory. A variety of security devices having electronic memories have been proposed. Examples of these include locks for controlling the opening of doors and other closure members, devices for controlling the operation of alarm systems, postage meters, cash dispensers, vehicles and other machinery. Generally, authorised persons are provided with respective data carriers bearing an encoded number, or are informed of a number to be applied to the security device. Several persons may be provided with the same number. Alternatively, different persons may be provided with different numbers, in order that the security device can distinguish different users and, possibly, maintain a record of the persons who have gained access to an enclosure or have used equipment. The number applied by a person to the security device, by means of a data carrier or otherwise, is compared with a number stored in the memory of the device. If these numbers are found to correspond, access or use is permitted.
There is a requirement for changing the number or numbers in the memory of such a security device, for example when authorisation of a particular person is revoked, or for initial storing of numbers in the memory by persons not concerned with manufacture of the security device.
In U.S. Pat. No. 4,213,118, GB No. 1,456,138, EP No. 122244 and EP No. 43270, there are described security devices having memories, the contents of which can be changed by use of a card or other information carrier. When the contents of the memory are such that the security device recognises a first information carrier as a valid carrier and provides a release signal when that first carrier is introduced into the security device, the security device will also recognise a second carrier which presents to the security device information having a predetermined relation with information presented by the first carrier. Application of the second carrier to the security device is accepted by the security device as an instruction to replace data in the memory corresponding to the first carrier by data corresponding to the second carrier. This results in the first carrier no longer being recognised as a valid carrier and recognition of the second carrier as a valid carrier.
In WO No. 80/02711, there is disclosed a security device with a permanent memory for storing data corresponding to a lock-identity key. The security device is programmed to store data which read from a second key, after data has been read from the lock identity key. This introduces the second key as a valid key and subsequent application of the valide key to the security device results in the generation of a release signal. The lock identity key can also be used for instructing the security device to erase from its memory data corresponding to keys other than the lock identity key.
The system described in WO No. 80/02711 has the advantage that a predetermined relationship between the lock identity key and user keys is unnecessary. Furthermore, several, different user keys can be recognisable by the security device as valid keys concurrently. However, the system suffers from the disadvantage that the lock identity key must be available and be used for changing the contents of the memory of the security device. Data corresponding to that presented by the lock identity key is permanently stored in the security device so that if the data presented by the lock identity key is compromised, for example by loss of the lock identity key, the security of the system is lost and can be restored only by replacement of hardware.
According to a first aspect of the present invention, there is provided a security system comprising first, second, third, fourth and subsequent data carriers, each presenting a respective encoded number, and a reading device for reading said numbers from the carriers, comparing numbers read from the carriers with numbers stored in the device and for providing an acceptance signal when a numb

REFERENCES:
patent: 3688269 (1972-08-01), Miller
patent: 3821704 (1974-06-01), Sabsay
patent: 4213118 (1980-07-01), Genest et al.
patent: 4283710 (1981-08-01), Genest et al.
patent: 4542465 (1985-09-01), Stockburger et al.
patent: 4594663 (1986-06-01), Nagata et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of operating a security device, security device and data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of operating a security device, security device and data , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of operating a security device, security device and data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2197501

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.